/usr/local/etc/swanctl/swanctl.conf
# Include config snippetsinclude conf.d/*.conf
/usr/local/etc/swanctl/conf.d/test.conf
pools { pool-rw-ipv4i { addrs = 172.16.208.0/24 dns = 172.16.0.254 }}
configctl ipsec restart
swanctl --list-pools
pool-rw-ipv4 172.16.203.0 0 / 0 / 254pool-rw-ipv4i 172.16.208.0 0 / 0 / 254
# cat /usr/local/etc/swanctl/swanctl.conf# This file is automatically generated. Do not editconnections { 00000000-0000-0000-0000-000000000000 { proposals = aes256-sha1-modp2048 unique = no aggressive = no<snip>
connections { 00000000-0000-0000-0000-000000000000 { proposals = aes256-sha1-modp1024 }}
Isabella, did you manage to have the tunnel fully working?
Also, in your custom conf file - did you use the connection id the same as in swanctl.conf, or you created full new settings (including p2 children section etc.)? Thanks!
connections { <the connection UUID from swanctl.conf> { proposals = aes256-sha1-modp1024 children { <the child UUID from swanctl.conf> { esp_proposals = aes256-sha1 }}}}
Are you sure this does not create any race conditions between the GUI config and the overwritten config?
Is it always the same proposals after every reload/restart of the service?
connections { con1 { children { con1 { esp_proposals = aes128-sha1 } } }}